Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (43)
  • Article (14)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6

13%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
13%
Overview of cloud platforms and appliances
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Athiphan Chunmano, 123RF
than 7,000 Amazon Machine Images (AMIs) in recent years, and you can use them to set up new servers in the cloud. The AMI library has grown historically, like the whole Amazon Cloud platform
13%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
with version 1.0, Windows Package Manager has quickly gained acceptance through community adoption of WinGet and its public repository, with more than 4,000 package contributions. In this article, I touch
13%
Warewulf Cluster Manager – Administration and Monitoring
21.08.2012
Home »  HPC  »  Articles  » 
, 0.02 n0001: 18:58:49 up 1:13, 0 users, load average: 0.00, 0.00, 0.00 With a simple Bash, Perl, or Python script and pdsh, you can query almost anything. Just be warned that you need to play
12%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
. Approximately 5,000 photos in JPEG, PNG, and Nikon RAW (NEF codec) formats and a few documents (PDF, LibreOffice Writer, and MS Word) were moved onto the servers in the test. In some cases, the images contained
12%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
object and eight for the user 13 policies in the privacy and telemetry section Six policies for Windows Defender Another six GPOs that control the Windows sandbox Looking at the numbers
12%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
AdvAutonomous on; 10 AdvRouterAddr off; 11 }; 12 13 }; IPv6 Attacks IPv6 basically suffers from all the existing classes of attacks against IPv4 and also introduces some new weaknesses

« Previous 1 2 3 4 5 6

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice